The 2020 design desktop software provides three choices to purchase. The first option is the 2020 design essentials which costs $1845 for the program and one-year license. $650 are required to renew the license. The first option only provides basic catalog access. The second option, for Counter Intelligence-AZ, is the 2020 design complete for $2995. The second option includes full access to the cabinet catalogs as well as basic catalogs. There remains the $650 fee for the one-year renewal regardless of which option is chosen. The last option is 2020 design complete and closet for $3490 which include all the complete option and closet design catalog access. The good news for Counter Intelligence-AZ is they maintain the hardware needed to operate …show more content…
The average net income per contract for Counter Intelligence-AZ remains at $750. If Counter Intelligence were to invest in the new program the net income should increase from $3,000 to $3,750 per month. This would increase Counter Intelligence-AZ’s annual net income from $36,000 to $45,000; however, the initial cost for the 2020 design essentials program will be $1,845 for the first year and $650 for subsequent years. This would put Counter Intelligence-AZ’s net annual income to $36,000 plus $11,000 and minus $1,845 of initial investment for a total net operating income of $43,155 for the first year. The second year would have an operating income of $45,000 minus the programs annual user fee of $650 to a total annual net operating income of $44,350. This program would have a return on investment for the first year of $11,000 minus $1,845 for a total of $9,155, or a 25.43% return on investment for the first year. The subsequent years would have a greater return on investment of 28.75%. As previously discussed in this paper, the reason why simply hiring more employees will not solve the inefficacies of the
Our decision is that Mr. Butkus should choose to implement both options. The additional capacity is definitely needed, and the demand to fill the capacity is also present. We calculated the possible revenue that could be earned under two sections: Low additional demand and High additional Demand. The additional revenue generated in these two scenarios are $42 900 and $31 200, respectively. Also, the in both of these scenarios, the time needed to pay for the cost of the required expansions are less than a year.
This book details the “adventures” of Jim Barton, the head of Loan Operations for IVK, Inc. Barton was the head of Loan Operations until his boss, CEO Carl Williams, asks him to become the CIO in order to help turn the IT department around. The only disadvantage is that Jim does not have any kind of background or extensive knowledge of IT.
After World War II American intelligence had the need to be transformed. The inexperience along with bureaucracy and poor coordination among American intelligence officers obligated the United States intelligence community to change dramatically in order to confront the new challenges that emerged after the end of WWII. From Early America through WWI the intelligence system of the United States of America was involved in operations in which they had to construct intelligence systems virtually from scratch (Andrew 1995). Human intelligence was already developed, but with certain limitations and other intelligence disciplines were underdeveloped and very seldom sophisticated. After WWI America recessed and settled in a period of peace. The United States faced no threat to its security from its neighbors, from powers outside of the Western Hemisphere (Lowenthal 2006). That caused a visible absence of intelligence activities, leaving America out of sight for any international conflicts; the United States of America focused and limited its activities beyond its own borders. In later years the Japanese attack to Pearl Harbor, America rushed to reactivate their military forces, moving from a passive country to full participation into a another international conflict; WWII. As a consequence, the United States engaged in activities that improved its intelligence system increasing its capabilities needed to address seriously the future threats of the Cold War.
Chapter 1-3 showed the beginnings of homeland security and the expansion and growth of Homeland Security. Chapter 4 shows the actions of homeland security, and the steps they take toward a problem to access it. The DHS above all needs to realized and understand how to address an attack quickly and efficiently, and have counter measure put into place beforehand. The DHS must be able to access the risks of any situation, and must decipher the potential hazard the situation could cause. When looking at the many functions of the DHS, nothing could be more important than the ability to understand or hinder or stop an attack man made or not. First Homeland Security studies the nature of the risk; this means that they study what is likely to happen in a certain situation. The texted explains risk as what can go wrong. A cigarette smoker takes a risk every time he lights up, and everyone take a risk when getting into a car. The DHS takes what they know from prior circumstances to determine the reality of the risk; the department must also anticipate any attack even without prior knowledge to the circumstance. The main questions of risk assessment are easy to understand, questions like will people be injured or harmed. But when looking at chapter 1 which asks the reader to look further into why terrorist commit terrorism, that’s when its easier to see the DHS skill at risk assessment. For example if you understand that a terrorist attack could be coming from radical Islamist terrorist; then you would understand a risk by understanding their motive behind the attack like their religious holidays. The DHS uses a three-fold method for risk assessment and they are threat, vulnerability and consequence. The Rand organization uses th...
The surroundings of Counterintelligence (CI) duties requires that CI Special Agents hold the highest levels of proficiency, maturity, moral values, and honorable intelligibility. All newly graduates from Counterintelligence Special Agent Course (CISAC) will be part of the Counterintelligence Probationary Program (CIPP) in the accordance with AR 381-20. The CIPP is an evaluation and mentoring program that allows Evaluating Agent (EA) to employ the CI Probationary Agent (PA) in a manner that allows growth in development. The PAs are retained in the 35L military occupational specialty upon completion of the CIPP. The real question that lingers in every PA’s mind is; how does the evaluation process take place?
The DIA started in 1958. The organizational structure of the DoD and U.S. foreign intelligence came to a new shape with the establishment of DIA. It was Robert McNamara, then Secretary of Defense, who came up with the concept of DIA in 1961. DIA gathers human source intelligence, analyzes technical intelligence, distributes intelligence/reports to the intelligence agencies, provides advice and support to the Joint Chiefs of Staff with foreign military intelligence, and provides military intelligence to combatant commands as its operational functions. A DIA director is supposed to be a three-star military general and DIA is believed to have employed at least 7,500 staff worldwide today. The DIA is a defense intelligence agency that prevents strategic surprises and delivers a decision advantage to warfighters, defense planners, and to policymakers. This paper will try to evaluate DIA’s role in US national security in present condition of massive budget deficits and increased congressional oversight, plus the intelligence capabilities of the Regional Combatant Commanders and the individual services like CIA and NSA.
Intelligence has come a long way since the time around 1,000 B.C. as Egyptian hieroglyphs have revealed and will only continue to grow far into the future. The Intelligence community (IC) will run into challenges far into the future but over the next several years it will be budgetary restructuring/cuts, cyber security implementation, and preventing the proliferation of weapons of mass destruction because a transitional phase within the United States will impact intelligence operations. The intelligence community is likely to transition back to its pre-9/11 requirements thus hindering or withdrawing post 9/11 implementations and requirements.
The National Gang Intelligence Center emphasizes that gang activity is on the rise, and is expanding and evolving to adapt to new cultural contexts and technological advances. Some of these groups have reached a surprising level of sophistication and can be involved in transnational sale and purchase of wholesale quantities of drugs as well as weapons and even human trafficking (National Gang Intelligence Center, 2011). Many people in law enforcement and the public have worried that gangs may start contracting and cooperating with terrorist groups to make domestic US terrorism a greater threat than it already is. However, most experts concur that there is little evidence of such cooperation as of yet, and that gangs are typically not willing
The National Security Act of 1947, signed by President Harry S Truman, is how the Central Intelligence Agency was formally created. The “office off director of central intelligence” was also created as a result of this Act. Anyone in this position served as head of the United States intelligence community and acts as the President’s principal advisor. He/She usually updates the President of any and all intelligence issues concerning national security (Wagner 13).
It is time to stop sitting on the sidelines and join the tip of the spear. Throughout my 14 years in the U.S. Army, I have always challenged myself to seek new goals that will simultaneously serve the Army in a more demanding aspect. My work ethic and passion to serve has landed me at a point in my career where I am ready to apply my abilities to assist the Special Operations Command in any aspect deemed necessary. Joining the elite Special Operations Command is not just a goal, it is something that means much more.
Intelligence collection and apprehension of criminals have occurred for many years; however, with the exception of the Federal Bureau of Investigation, these actions were performed by different organizations. Nonetheless, roles and responsibilities have changed since the attacks on September 11, 2001. Intelligence-led policing and the National Criminal Intelligence Sharing program were incorporated, and fusion centers were established to help gather intelligence from different levels of the government. Although law enforcement at the local, state, and tribal levels aid in intelligence collection, it is important to ensure that intelligence gathered to protect national security and law enforcement intelligence are kept separately. Even though law enforcement operations can strengthen intelligence operations and vice versa, complications can arise when the two actions are combined. Government agencies must also ensure that sensitive and secret information does not leak or is not compromised when sharing intelligence. Therefore the purpose is to describe intelligence and law enforcement operations, discuss the expectations of prevention and punishment, and discuss the benefits and consequences of combining law enforcement and intelligence operations.
During the last few years, Harry Davis Industries has been too constrained by the high cost of capital to make many capital investments. Recently, though, capital costs have been declining, and the company has decided to look seriously at a major expansion program that had been proposed by the marketing department. Assume that you are an assistant to Leigh Jones, the financial vice president. Your first task is to estimate Harry Davis’s cost of capital. Jones has provided you with the following data, which she believes may be relevant to your task.
Research and development plays a big role here at Samsung creating the ability towards taking the next step of building a better future. In 2015, Samsung spent $14 billion dollars on research and development alone, so it’s surprise why we are willing to spend $50 million on the first year of the product. We will use our research and development team to improve the quality of our smartphone via updates and discover reasons why consumers are passing up on our new smartphone. From year 1 to year 2 there will be an increase of 16% in the research and development expense and from year 2 to year there will be a 7% increase. Most of our highly praised tech like the Galaxy S7 and S7 Edge are due to are research and development teams. The general / selling/ administrative expenses all include fixed costs, advertisements, and direct and indirect costs. With the percentage nearing the profit margin it represents that we’re are in the competitive smartphone market. The change from year 1 to year 2 for the general / selling / administrative expenses increased by 9% and it increased again but only by 4%. The pie graph at the bottom displays the % that goes to in expense. For General / Selling / Administrative expense, I’ve separated the advertisement budget to its own
Throughout the history of America there has been a form of law enforcement present. In the 1600’s, watchmen and constables were the law enforcement officer. These positions were voluntary, and sometimes even obligatory. As time progressed law enforcement became much more time consuming and dangerous. This created the need for a twenty-four hour police force. In 1833 Philadelphia created the first twenty-four hour police department dedicated to prevention of crime and apprehension of criminals. Soon after Philadelphia created their police department, Boston and New York followed.
Intelligence report writing takes a lot of preparation before finalizing or conducting a brief. There are many different techniques that can be used to present information that has been discovered during an intelligence investigation. Various charts can be used to analyze the timelines, criminal activities, financial activities, or biographical profiles to prove or disprove lawful conduct of the individual or the organization.